VID |
22514 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
According to its self-reported version number, the instance of Apache Tomcat 7.x listening on the remote host is earlier than 7.0.11 and as such, may be affected by a security bypass vulnerability.
When a web application is started, 'ServletSecurity' annotations might be ignored which could lead to some areas of the applications not being protected as expected.
Note that Nessus did not actually test for the flaw but instead has relied on the version in Tomcat's banner or error page.
* Note: This check solely relied on the version number of the remote Web server to assess this vulnerability, so this might be a false positive.
* References: http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.11_(released_11_Mar_2011) http://mail-archives.apache.org/mod_mbox/www-announce/201103.mbox/%3C4D6E74FF.7050106@apache.org%3E
* Platforms Affected: Apache Tomcat Server versions prior to 7.0.11 Any operating system Any version |
Recommendation |
Upgrade to the latest version of Apache Tomcat Server (7.0.11 or later), available from the Apache Software Foundation download site, http://tomcat.apache.org/ |
Related URL |
CVE-2011-1088 (CVE) |
Related URL |
46685 (SecurityFocus) |
Related URL |
(ISS) |
|